Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud services
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
Human Factors
user data privacy
transparent data sanitization
textual documents
sensitive information
sensitive image documents
sensitive data
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy
learning (artificial intelligence)
automatic data sanitization
Human behavior
encryption
document image processing
deep learning
Data Sanitization
data privacy
data deletion
Compositionality
CloudDLP
cloud services
Cloud Computing
Browsers
browser-based cloud storage
biblio
A Survey of Time-varying Structural Modeling to Accountable Cloud Services
Submitted by grigby1 on Fri, 05/22/2020 - 2:17pm
Metrics
uncertainty correlation
uncertainty
time-varying structure modeling methods
time-varying structural modeling
time varying structure
Software
Resiliency
resilience
pubcrawl
network accountability
modeling
accountable cloud services
Correlation
computing characteristics
Computational modeling
composability
cloud services
cloud service structure modeling
cloud service network architecture
cloud service accountability
Cloud Computing
Analytical models
biblio
Machine Learning Based Ransomware Detection Using Storage Access Patterns Obtained From Live-forensic Hypervisor
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
Internet of Things devices
UK National Health Service
storage access patterns
static ransomware analysis
prevention systems
machine learning based ransomware detection
live-forensic hypervisor
live ransomware samples
large-scale cyber attacks
dynamic ransomware analysis
dynamic analysis
benign application
behavioral model
Zero-day attacks
invasive software
ransomware attacks
mobile devices
cloud services
machine learning
Metrics
Ransomware
composability
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
support vector machine
Support vector machines
biblio
Efficient Privacy-Preserving User Identity with Purpose-Based Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
identity management systems
Scalability
resilience
purpose-based encryption
pubcrawl
Protocols
privacy-preserving user identity
Privacy-preserving
Privacy Policies
privacy
PII
personal identifiable information
identity propagation
attribute-based encryption
Identity management
Human behavior
General Data Protection Regulation
federated identity management
Facebook
encryption
Data protection
Cryptography
cloud services
cloud environment
Cloud Computing
authorization
biblio
Research on Protection for the Database Security Based on the Cloud of Smart Grid
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
information security
state grid
smart power grids
Smart Grid
sensitive data encryption
security of data
safety protection
Resiliency
pubcrawl
production data desensitization
Predictive Metrics
power engineering computing
Internet market
internet
information security assurance
Big Data
encryption audits
database security audit technology
database management systems
database firewall technology
Data Security
Cryptography
Compositionality
cloud services
cloud security issues
cloud environment
cloud database security protection
cloud database security
Cloud Computing
biblio
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
Submitted by aekwall on Mon, 12/30/2019 - 12:36pm
Homomorphic encryption
TFHE library
OpenMP
multiprocessing enhancements
multiplication operation
MPI
latency reduction
Boolean Circuit
arithmetic operations
arithmetic circuit homomorphic encryption
Arithmetic Algorithm
arithmetic
adders
Informatics
Cloud Computing
multiprocessing systems
Registers
Human Factors
cloud services
Logic gates
Libraries
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Attackers are using cloud services to mask attack origin and build false trust
Submitted by willirn1 on Wed, 09/11/2019 - 10:38am
Articles of Interest
C3E 2019
cloud services
Cognitive Security
Cognitive Security in Cyber
Hacking
malware
Cognitive Security
Articles of Interest
C3E 2019
« first
‹ previous
1
2
3
4
next ›
last »